Theoretically, the One Time Pad is unbreakable. Developed in 1882, no AI needed. Look more to Information Theory. Claude Shannon himself proved its robustness. The problem, though, is how you securely distribute the keys to trusted entities (avoiding attacks like Man-in-the-Middle and endpoint sniffing, etc.). This was the motive for the revolutionary Diffey-Hellman key exchange algorithm.
To add to George Slade's answer, you would need a true random number generator (TRNG) to create the one time pads, in theory if you generate ciphertext XYZ using a one time pad based on a TRNG then for a brute force attacker all 3 letter words in the dictionary are equally probable in being the original plaintext.